{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:11:38Z","timestamp":1755216698669,"version":"3.43.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/ccis.2018.8691236","type":"proceedings-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T18:51:49Z","timestamp":1555354309000},"page":"183-186","source":"Crossref","is-referenced-by-count":0,"title":["Dynamically Exchanging Nodes of the Critical Node Problem"],"prefix":"10.1109","author":[{"given":"XiangRong","family":"Zeng","sequence":"first","affiliation":[{"name":"Robotics Laboratory for Logistics Service, The Chinese University of Hong Kong, Shenzhen, 518172, China."}]},{"given":"SiYang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Xi&#x2019;an Jiao Tong University, Xi&#x2019;an, China"}]},{"given":"LiFan","family":"Shen","sequence":"additional","affiliation":[{"name":"Robotics Laboratory for Logistics Service, The Chinese University of Hong Kong, Shenzhen, 518172, China."}]},{"given":"YongQuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Robotics Laboratory for Logistics Service, The Chinese University of Hong Kong, Shenzhen, 518172, China."}]},{"given":"ZhangHua","family":"Fu","sequence":"additional","affiliation":[{"name":"Robotics Laboratory for Logistics Service, The Chinese University of Hong Kong, Shenzhen, 518172, China."}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2013.03.021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/net.20464"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10732-015-9290-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2012.02.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/net.21671"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/362248.362272"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2013.09.012"},{"key":"ref3","first-page":"111","article-title":"Finding critical nodes for inhibiting diffusion of complex contagions in social networks[C]","author":"j","year":"0","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2107-8_10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/9789812771667_0007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-015-0010-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7084-x"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/TNET.2012.2215882","article-title":"On the discovery of critical links and nodes for assessing network vulnerability [J]","volume":"21","author":"y","year":"2013","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2008.08.016"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.ins.2016.10.014","article-title":"Optimizing network attacks by artificial bee colony [J]","volume":"377","author":"m","year":"2017","journal-title":"Information Sciences"}],"event":{"name":"2018 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2018,11,23]]},"location":"Nanjing, China","end":{"date-parts":[[2018,11,25]]}},"container-title":["2018 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8681058\/8691125\/08691236.pdf?arnumber=8691236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:41:49Z","timestamp":1754332909000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8691236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccis.2018.8691236","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}